{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:58:38Z","timestamp":1743015518354,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030453848"},{"type":"electronic","value":"9783030453855"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45385-5_10","type":"book-chapter","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T12:13:38Z","timestamp":1590581618000},"page":"108-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Window Functions in Rhythm Based Biometric Authentication"],"prefix":"10.1007","author":[{"given":"Orcan","family":"Alpar","sequence":"first","affiliation":[]},{"given":"Ondrej","family":"Krejcar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,30]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2017.09.078","volume":"80","author":"ND Sarier","year":"2017","unstructured":"Sarier, N.D.: Multimodal biometric identity based encryption. Future Gener. Comput. Syst. 80, 112\u2013125 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"10_CR2","first-page":"1","volume":"28","author":"CJ Kroeze","year":"2016","unstructured":"Kroeze, C.J., Malan, K.M.: User authentication based on continuous touch biometrics. S. Afr. Comput. J. 28(2), 1\u201323 (2016)","journal-title":"S. Afr. Comput. J."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2016.11.031","volume":"230","author":"S Mondal","year":"2017","unstructured":"Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1\u201322 (2017)","journal-title":"Neurocomputing"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Alshanketi, F., Traore, I., Ahmed, A.A.: Improving performance and usability in mobile keystroke dynamic biometric authentication. In: Security and Privacy Workshops (SPW). IEEE (2016)","DOI":"10.1109\/SPW.2016.12"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.patrec.2017.02.010","volume":"89","author":"A Alsultan","year":"2017","unstructured":"Alsultan, A., Warwick, K., Wei, H.: Non-conventional keystroke dynamics for user authentication. Pattern Recogn. Lett. 89, 53\u201359 (2017)","journal-title":"Pattern Recogn. Lett."},{"issue":"17","key":"10_CR6","doi-asserted-by":"publisher","first-page":"6286","DOI":"10.1016\/j.eswa.2015.04.052","volume":"42","author":"O Alpar","year":"2015","unstructured":"Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst. Appl. 42(17), 6286\u20136294 (2015)","journal-title":"Expert Syst. Appl."},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.engappai.2013.11.009","volume":"32","author":"O Alpar","year":"2014","unstructured":"Alpar, O.: Keystroke recognition in user authentication using ANN based RGB histogram technique. Eng. Appl. Artif. Intell. 32, 213\u2013217 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Alpar, O., Krejcar, O.: Biometric swiping on touchscreens. In: Computer Information Systems and Industrial Management (2015)","DOI":"10.1007\/978-3-319-24369-6_16"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Alpar, O., Krejcar, O.: Pattern password authentication based on touching location. In: Intelligent Data Engineering and Automated Learning\u2013IDEAL 2015 (2015)","DOI":"10.1007\/978-3-319-24834-9_46"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.future.2018.03.030","volume":"86","author":"O Alpar","year":"2018","unstructured":"Alpar, O.: Biometric touchstroke authentication by fuzzy proximity of touch locations. Future Gener. Comput. Syst. 86, 71\u201380 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-60042-0_31","volume-title":"Advances in Artificial Intelligence: From Theory to Practice","author":"O Alpar","year":"2017","unstructured":"Alpar, O., Krejcar, O.: Biometric keystroke signal preprocessing Part I: signalization, digitization and alteration. In: Benferhat, S., Tabia, K., Ali, M. (eds.) IEA\/AIE 2017. LNCS (LNAI), vol. 10350, pp. 267\u2013276. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60042-0_31"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-60042-0_34","volume-title":"Advances in Artificial Intelligence: From Theory to Practice","author":"O Alpar","year":"2017","unstructured":"Alpar, O., Krejcar, O.: Biometric keystroke signal preprocessing Part II: manipulation. In: Benferhat, S., Tabia, K., Ali, M. (eds.) IEA\/AIE 2017. LNCS (LNAI), vol. 10350, pp. 289\u2013294. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60042-0_34"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2016.11.006","volume":"116","author":"O Alpar","year":"2017","unstructured":"Alpar, O.: Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl.-Based Syst. 116, 163\u2013171 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-42007-3_13","volume-title":"Trends in Applied Knowledge-Based Systems and Data Science","author":"O Alpar","year":"2016","unstructured":"Alpar, O., Krejcar, O.: Hidden frequency feature in electronic signatures. In: Fujita, H., Ali, M., Selamat, A., Sasaki, J., Kurematsu, M. (eds.) IEA\/AIE 2016. LNCS (LNAI), vol. 9799, pp. 145\u2013156. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-42007-3_13"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Alpar, O., Krejcar, O.: Online signature verification by spectrogram analysis. Appl. Intell. (2017). \nhttps:\/\/doi.org\/10.1007\/s10489-017-1009-x","DOI":"10.1007\/s10489-017-1009-x"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-319-92058-0_69","volume-title":"Recent Trends and Future Technology in Applied Intelligence","author":"O Alpar","year":"2018","unstructured":"Alpar, O., Krejcar, O.: Frequency and time localization in biometrics: STFT vs. CWT. In: Mouhoub, M., Sadaoui, S., Ait Mohamed, O., Ali, M. (eds.) IEA\/AIE 2018. LNCS (LNAI), vol. 10868, pp. 722\u2013728. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-92058-0_69"},{"issue":"7","key":"10_CR17","doi-asserted-by":"publisher","first-page":"10649","DOI":"10.1016\/j.eswa.2009.02.075","volume":"36","author":"SS Hwang","year":"2009","unstructured":"Hwang, S.S., Lee, H.J., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Syst. Appl. 36(7), 10649\u201310656 (2009)","journal-title":"Expert Syst. Appl."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.eswa.2019.06.057","volume":"136","author":"O Alpar","year":"2019","unstructured":"Alpar, O.: TAPSTROKE: a novel intelligent authentication system using tap frequencies. Expert Syst. Appl. 136, 426\u2013438 (2019)","journal-title":"Expert Syst. Appl."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Roh, J.H., Lee, S.H., Kim, S.: Keystroke dynamics for authentication in smartphone. In: International Conference on Information and Communication Technology Convergence (ICTC). IEEE (2016)","DOI":"10.1109\/ICTC.2016.7763394"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: CHI 2012 Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, New York (2012)","DOI":"10.1145\/2207676.2208543"},{"issue":"5","key":"10_CR21","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"TY Chang","year":"2012","unstructured":"Chang, T.Y., Tsai, C.J., Lin, J.H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157\u20131165 (2012)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Bioinformatics and Biomedical Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45385-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T12:20:44Z","timestamp":1590582044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45385-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030453848","9783030453855"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45385-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWBBIO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Bioinformatics and Biomedical Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Granada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwbbio2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwbbio.ugr.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}